Resultados de procura
-
1
-
2
-
3
-
4
-
5
Hack proofing your Web applications : the only way to stop a hacker is to think like one.
Publicado 2001Ligazón do recurso
Licensed eBooks -
6
-
7
Information security best practices : 200 basic rules /
Publicado 2001Ligazón do recurso
Licensed eBooks -
8
-
9
Techniques and applications of digital watermarking and content protection /
Publicado 2003Ligazón do recurso
Licensed eBooks -
10
Who goes there? : authentication through the lens of privacy /
Publicado 2003Ligazón do recurso
Licensed eBooks -
11
Protecting your library's digital sources : the essential guide to planning and preservation /
Publicado 2004Ligazón do recurso
Licensed eBooks -
12
-
13
Buffer overflow attacks : detect, exploit, prevent /
Publicado 2005Ligazón do recurso
Licensed eBooks -
14
Security and control in information systems : a guide for business and accounting /
Publicado 2000Ligazón do recurso
Licensed eBooks -
15
-
16
Basics of contemporary cryptography for IT practitioners /
Publicado 2005Ligazón do recurso
Licensed eBooks -
17
Essential computer security : everyone's guide to e-mail, internet, and wireless security /
Publicado 2006Ligazón do recurso
Licensed eBooks -
18
-
19
Risk management for computer security : Protecting your network and information assets /
Publicado 2005Ligazón do recurso
Licensed eBooks -
20
Hack the stack : using snort and ethereal to master the 8 layers of an insecure network /
Publicado 2006Ligazón do recurso
Licensed eBooks